{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,5]],"date-time":"2025-04-05T04:02:58Z","timestamp":1743825778345,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642319112"},{"type":"electronic","value":"9783642319129"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-31912-9_26","type":"book-chapter","created":{"date-parts":[[2012,7,14]],"date-time":"2012-07-14T07:57:56Z","timestamp":1342252676000},"page":"391-405","source":"Crossref","is-referenced-by-count":8,"title":["Breaking a 3D-Based CAPTCHA Scheme"],"prefix":"10.1007","author":[{"given":"Vu Duc","family":"Nguyen","sequence":"first","affiliation":[]},{"given":"Yang-Wai","family":"Chow","sequence":"additional","affiliation":[]},{"given":"Willy","family":"Susilo","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"26_CR1","unstructured":"ABBYY. ABBYY FineReader, http:\/\/finereader.abbyy.com"},{"key":"26_CR2","doi-asserted-by":"crossref","unstructured":"Chaudhari, S.K., Deshpande, A.R., Bendale, S.B., Kotian, R.V.: 3D Drag-n-drop CAPTCHA Enhanced Security through CAPTCHA. In: Mishra, B.K. (ed.) ICWET, pp. 598\u2013601. ACM (2011)","DOI":"10.1145\/1980022.1980153"},{"key":"26_CR3","doi-asserted-by":"crossref","unstructured":"Chellapilla, K., Larson, K., Simard, P.Y., Czerwinski, M.: Designing Human Friendly Human Interaction Proofs (HIPs). In: van der Veer, G.C., Gale, C. (eds.) CHI, pp. 711\u2013720. ACM (2005)","DOI":"10.1145\/1054972.1055070"},{"key":"26_CR4","doi-asserted-by":"crossref","unstructured":"Chellapilla, K., Simard, P.Y.: Using Machine Learning to Break Visual Human Interaction Proofs (HIPs). In: NIPS (2004)","DOI":"10.1145\/1054972.1055070"},{"key":"26_CR5","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1109\/CW.2010.48","volume-title":"Proceedings of the 2010 International Conference on Cyberworlds, CW 2010","author":"Y.-W. Chow","year":"2010","unstructured":"Chow, Y.-W., Susilo, W., Zhou, H.-Y.: CAPTCHA Challenges for Massively Multiplayer Online Games: Mini-game CAPTCHAs. In: Proceedings of the 2010 International Conference on Cyberworlds, CW 2010, pp. 254\u2013261. IEEE Computer Society, Washington, DC (2010)"},{"key":"26_CR6","doi-asserted-by":"crossref","unstructured":"Imsamai, M., Phimoltares, S.: 3D CAPTCHA: A Next Generation of the CAPTCHA. In: Proceedings of the International Conference on Information Science and Applications (ICISA 2010), Seoul, South Korea, April 21-23, pp. 1\u20138. IEEE Computer Society (2010)","DOI":"10.1109\/ICISA.2010.5480258"},{"key":"26_CR7","doi-asserted-by":"publisher","first-page":"1057","DOI":"10.1109\/ICCIT.2009.105","volume-title":"Proceedings of the 2009 Fourth International Conference on Computer Sciences and Convergence Information Technology, ICCIT 2009","author":"I.F. Ince","year":"2009","unstructured":"Ince, I.F., Salman, Y.B., Yildirim, M.E., Yang, T.-C.: Execution Time Prediction for 3D Interactive CAPTCHA by Keystroke Level Model. In: Proceedings of the 2009 Fourth International Conference on Computer Sciences and Convergence Information Technology, ICCIT 2009, pp. 1057\u20131061. IEEE Computer Society, Washington, DC (2009)"},{"issue":"1","key":"26_CR8","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1109\/MSP.2008.6","volume":"6","author":"A. Kolupaev","year":"2008","unstructured":"Kolupaev, A., Ogijenko, J.: CAPTCHAs: Humans vs. Bots. IEEE Security & Privacy\u00a06(1), 68\u201370 (2008)","journal-title":"IEEE Security & Privacy"},{"key":"26_CR9","doi-asserted-by":"crossref","unstructured":"Li, S., Shah, S.A.H., Khan, M.A.U., Khayam, S.A., Sadeghi, A.-R., Schmitz, R.: Breaking e-Banking CAPTCHAs. In: Gates, C., Franz, M., McDermott, J.P. (eds.) ACSAC, pp. 171\u2013180. ACM (2010)","DOI":"10.1145\/1920261.1920288"},{"key":"26_CR10","doi-asserted-by":"crossref","unstructured":"Macias, C., Izquierdo, E.: Visual Word-based CAPTCHA using 3D Characters. IET Seminar Digests\u00a02009(2), P41\u2013P41 (2009)","DOI":"10.1049\/ic.2009.0269"},{"key":"26_CR11","first-page":"1","volume":"5","author":"C. Mancas-Thillou","year":"2007","unstructured":"Mancas-Thillou, C., Ferreira, S., Demeyer, J., Minetti, C., Gosselin, B.: A Multifunctional Reading Assistant for the Visually Impaired. J. Image Video Process. 2007, 5:1\u20135:11 (2007)","journal-title":"J. Image Video Process"},{"key":"26_CR12","doi-asserted-by":"crossref","unstructured":"Mori, G., Malik, J.: Recognizing Objects in Adversarial Clutter: Breaking a Visual CAPTCHA. In: CVPR (1), pp. 134\u2013144 (2003)","DOI":"10.1109\/CVPR.2003.1211347"},{"key":"26_CR13","doi-asserted-by":"crossref","unstructured":"Moy, G., Jones, N., Harkless, C., Potter, R.: Distortion Estimation Techniques in Solving Visual CAPTCHAs. In: CVPR (2), pp. 23\u201328 (2004)","DOI":"10.1109\/CVPR.2004.1315140"},{"key":"26_CR14","unstructured":"OCR Research Team. Teabag 3D CAPTCHA, http:\/\/ocr-research.org.ua"},{"key":"26_CR15","unstructured":"Rediff Inc. Rediffmail, http:\/\/register.rediff.com\/register\/register.php"},{"key":"26_CR16","doi-asserted-by":"crossref","unstructured":"Ross, S.A., Halderman, J.A., Finkelstein, A.: Sketcha: a CAPTCHA based on Line Drawings of 3D Models. In: Rappa, M., Jones, P., Freire, J., Chakrabarti, S. (eds.) WWW, pp. 821\u2013830. ACM (2010)","DOI":"10.1145\/1772690.1772774"},{"key":"26_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1007\/978-3-642-17619-7_17","volume-title":"Cryptology and Network Security","author":"W. Susilo","year":"2010","unstructured":"Susilo, W., Chow, Y.-W., Zhou, H.-Y.: STE3D-CAP: Stereoscopic 3D CAPTCHA. In: Heng, S.-H., Wright, R.N., Goi, B.-M. (eds.) CANS 2010. LNCS, vol.\u00a06467, pp. 221\u2013240. Springer, Heidelberg (2010)"},{"key":"26_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1007\/3-540-39200-9_18","volume-title":"Advances in Cryptology \u2013 EUROCRPYT 2003","author":"L. Ahn von","year":"2003","unstructured":"von Ahn, L., Blum, M., Hopper, N.J., Langford, J.: CAPTCHA: Using Hard AI Problems for Security. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol.\u00a02656, pp. 294\u2013311. Springer, Heidelberg (2003)"},{"key":"26_CR19","doi-asserted-by":"crossref","unstructured":"Yan, J., Ahmad, A.S.E.: Breaking Visual CAPTCHAs with Naive Pattern Recognition Algorithms. In: ACSAC, pp. 279\u2013291. IEEE Computer Society (2007)","DOI":"10.1109\/ACSAC.2007.47"},{"key":"26_CR20","doi-asserted-by":"crossref","unstructured":"Yan, J., Ahmad, A.S.E.: A Low-Cost Attack on a Microsoft CAPTCHA. In: ACM Conference on Computer and Communications Security, pp. 543\u2013554 (2008)","DOI":"10.1145\/1455770.1455839"},{"key":"26_CR21","doi-asserted-by":"crossref","unstructured":"Yan, J., Ahmad, A.S.E.: Usability of CAPTCHAs or Usability Issues in CAPTCHA Design. In: Cranor, L.F. (ed.) SOUPS. ACM International Conference Proceeding Series, pp. 44\u201352. ACM (2008)","DOI":"10.1145\/1408664.1408671"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology - ICISC 2011"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-31912-9_26.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,4]],"date-time":"2025-04-04T04:06:34Z","timestamp":1743739594000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-31912-9_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642319112","9783642319129"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-31912-9_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}